Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt

Eran Hammer-Lahav <eran@hueniverse.com> Thu, 27 January 2011 03:23 UTC

Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6098628C0F3 for <oauth@core3.amsl.com>; Wed, 26 Jan 2011 19:23:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.561
X-Spam-Level:
X-Spam-Status: No, score=-2.561 tagged_above=-999 required=5 tests=[AWL=0.038, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MxWjciZLd1XG for <oauth@core3.amsl.com>; Wed, 26 Jan 2011 19:23:54 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id C00743A6867 for <oauth@ietf.org>; Wed, 26 Jan 2011 19:23:54 -0800 (PST)
Received: (qmail 16665 invoked from network); 27 Jan 2011 03:26:57 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 27 Jan 2011 03:26:57 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Wed, 26 Jan 2011 20:26:54 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: William Mills <wmills@yahoo-inc.com>, Marius Scurtescu <mscurtescu@google.com>
Date: Wed, 26 Jan 2011 20:26:35 -0700
Thread-Topic: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
Thread-Index: Acu9ogeRAwlXT0bpQq61uKkqcPiAygACe9PAAACUY8AACOWwUA==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723445A8D627C5@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <20110121004501.28103.96097.idtracker@localhost> <90C41DD21FB7C64BB94121FBBC2E723445A8D61C8E@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723445A8D61CBA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTimzOErQhT_gjdQrcawVgfsnr_2RVtTOYRoP-fcR@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723445A8D62545@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTi=doUBwOyvZx+GyJSB7N19hpQEE-UqAfQ1F-xSv@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723445A8D6275A@P3PW5EX1MB01.EX1.SECURESERVER.NET> <FFDFD7371D517847AD71FBB08F9A31563848E7CF15@SP2-EX07VS06.ds.corp.yahoo.com>
In-Reply-To: <FFDFD7371D517847AD71FBB08F9A31563848E7CF15@SP2-EX07VS06.ds.corp.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jan 2011 03:23:56 -0000

This is a good example of why this is currently out of scope. We have little to no implementation experience with such a setup.

EHL

> -----Original Message-----
> From: William Mills [mailto:wmills@yahoo-inc.com]
> Sent: Wednesday, January 26, 2011 3:17 PM
> To: Eran Hammer-Lahav; Marius Scurtescu
> Cc: oauth@ietf.org
> Subject: RE: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
> 
> Actually I was envisioning a situation where you have multiple possibly
> disparate endpoints that rely on authenticator like Google or Yahoo.  One
> company decides they want to allow federated login and accept SAML
> assertions, another accepts bearer, yet a 3rd IMAP server accepts both some
> form of signed auth and bearer.  I think discovery for a service should allow
> the service to specify the type(s) of auth accepted and the client can choose
> one that it supports and pass that on to the token server.  The resource
> server has to know what auth types are supported by the token server.  I
> would rather have this explicit in the discovery information and support
> multiple types in the same SASL mechanism than have to offer N
> mechanisms (or 2N if channel binding is in play).
> 
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > Of Eran Hammer-Lahav
> > Sent: Wednesday, January 26, 2011 2:58 PM
> > To: Marius Scurtescu
> > Cc: oauth@ietf.org
> > Subject: Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
> >
> >
> >
> > > -----Original Message-----
> > > From: Marius Scurtescu [mailto:mscurtescu@google.com]
> > > Sent: Wednesday, January 26, 2011 1:43 PM
> > > To: Eran Hammer-Lahav
> > > Cc: oauth@ietf.org
> > > Subject: Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
> >
> > > >> 1. The token_type parameter is required in responses from the
> > server.
> > > >> If the server supports multiple formats, which one will be used?
> > In
> > > >> this case, would it make sense to allow the client to request a
> > specific
> > > format?
> > > >>
> > > >> For example, if the authorization server supports both MAC and
> > > >> BEARER, which one will the server issue?
> > > >
> > > > It might in some cases, but I suspect most providers are going to
> > decide
> > > which scheme provides the right level of security for them and just
> > use that.
> > > If you are going to allow both MAC and BEARER, you are basically
> > letting
> > > clients decide which level to operate at. Do you have a need or plan
> > to
> > > support multiple token types?
> > >
> > > For now we are planning to support only bearer, but I am sure some
> > form of
> > > signed tokens will follow sooner than later. At which point we would
> > have to
> > > support both.
> > >
> > > In most cases I think it is up to the client to decide.
> >
> > Interesting. Given that you are not planning on supporting this in the
> > near future, I think we should wait until there is more deployment
> > experience in allowing the client to negotiate the token type. But of
> > course, you are welcome to submit a proposal for inclusion on the WG
> > new charter.
> >
> > EHL
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth